You are on page 1of 24

TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.

com/tor-anonymity-things-not-using-tor/

FOLLOW: # $ %+ '
TOR fossBytes
Anonymity: 177,931 likes

Things Not Like Page Share

To DoWhile Be the first of your friends to like


this

Using TOR
BY ADITYA TIWARI ON JAN 07,
2016 IN SECURITY
FOSSBYTES NEWSLETTER

Start Download
Get the latest technology news delivered to
your inbox.
Proxy Server Download Free! Email

Subscribe

Microsoft Is Hiring Linux Folks


S h o r t B y te s : Being
For A Secret Open Source
Anonymous online is the Unit
need of the hour, and TOR 23 APR, 2016

1 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


CERN Makes 300TB of Large
Tech Hadron Collider Data Public
News 23 APR, 2016
Security
Geek
Ubuntu 16.10 Is Codenamed
Science
Yakkety Yak But, What
How To
Does It Mean?
Reviews
23 APR, 2016
Advertise
)
Deals Usage of Tor Browser To
Access Facebook Crosses 1
he internet
T Million Mark
is 23 APR, 2016
awe-inspiring, but it
The Computer Hardware
has its nightmares
Chart: Can You Identify Your
for the ones who PCs Parts?
get stalked and 23 APR, 2016

harassed in the
18-year-old Teenager Dies
digital world. They While Unplugging His Phone
cant really get away At Internet Cafe
22 APR, 2016
from the
predicament, one
possible recourse is
to go anonymous
while using the
internet with the
help of various tools
available. Name it,
VPN, TOR, or you
can use a proxy
fossBytes Newsletter
Get the latest technology news delivered

server for your to your inbox.
anonymity needs.

Apart from all these Subscribe


available options,

2 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
regarded as the best
cloak for those
people who want to
hide on the internet.
Edward Snowden,
who came into light
after he acted as the
whistleblower and
exposed NSAs
unethical
surveillance
activities, used TOR
browser in order to
do so. He was also
inculpated by the
federal agencies
that his disclosure of
confidential
information was the
impetus behind the
fossBytes Newsletter
Get the latest technology news delivered

Paris death to your inbox.

massacre.

Subscribe

3 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals

The Onion Router


has the forte to
protect you and
hide you from all
those stalkers and
malevolent minds,
who follow you on
the internet. Even if
you want to be
another Edward
Snowden, you can
very well do so, by
using TOR browser.
But you just cant
turn a blind eye on
the fact, little of
your mistake will
contribute to fossBytes Newsletter
Get the latest technology news delivered

divulging your
to your inbox.
identity on the
internet, no matter
how secure do you Subscribe
consider yourself.

4 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
keep in mind and it
will help you to be
anonymous online.

You need to read


the following article
as there is no point
moving further if
you are unaware of
what is The Onion

Now you have an


idea about TOR,
start reading . . .

Here are some


fossBytes Newsletter
Get the latest technology news delivered

habits which you to your inbox.
should avoid while
using the mighty
Subscribe
TOR:

5 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
verificatio
n on Tor
Most websites
provide a 2-Step
verification using a
mobile number in
which an OTP (One
Time Password) is
sent to your mobile
number to safely
login to your
account. You need
to be careful with it
when you are using
TOR browser for
accessing your
account.

If you provide your


fossBytes Newsletter
Get the latest technology news delivered

mobile number to a to your inbox.
website, it will only
hamper your
Subscribe
anonymity status
online as it will be

6 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
operator can easily
track you down as
they also keep your
devices IMEI
number in their
database and can be
used to track you.

Dont
operate
user
accounts
outside
TOR
If you use TOR
browser for fossBytes Newsletter
Get the latest technology news delivered

checking your
to your inbox.
Facebook, Twitter or
email accounts,
dont ever use those Subscribe
accounts outside

7 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
location, your IP
address, and other
details. Using your
account in the open
internet even once
will be enough to
get your IP address
logged and
eventually reveal
your identity.

Dont post
your
personal
informatio
n
You must engrave
fossBytes Newsletter
Get the latest technology news delivered

this point in your to your inbox.
heart, do not post
any sort of
Subscribe
information like
name, address,

8 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals To keep yourself

completely hidden,
you need to be
pseudonymous.
Now, whats that? It
means you need to
assume yourself as a
disparate person
while you use TOR.
The new person
should have
dissimilar likes and
hatreds, food
choices, fantasies,
etc.

For that purpose,


create a new user
account with a new
email address that fossBytes Newsletter
Get the latest technology news delivered

doesnt reflect even
to your inbox.
a bit of your real
identity. You can use
that email for your Subscribe
social accounts and

9 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
An anonymous
connection is the
one in which the
server which is
being requested a
connection has no
idea about your real
IP address/location
and your identity.

A pseudonymous
connection is the
one in which the
server which is
being requested has
no idea about your
real IP
address/location,
but does have an
identity it can
fossBytes Newsletter
Get the latest technology news delivered

associate the to your inbox.

connection with.

Dont send Subscribe

10 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
definitely came
across the fact that
TOR encrypts your
connection not your
data and TORs exit
nodes are
vulnerable. So, it is
highly advisable not
send unencrypted
data over the TOR
network, as
someone might
access your
information while
the data is on the
last node.

Dont use
TOR with
fossBytes Newsletter
Get the latest technology news delivered

Windows to your inbox.

Microsofts
Subscribe
Windows is the
worlds most used

11 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
vulnerabilities that
exist on the
operating system
and may reveal your
identity even if you
are using the TOR to
access the internet.

Linux systems will


serve you well for
this purpose. Linux
distributions like
Tails and Whonix are
pre-configured with
TOR or you can
configure it
manually on any
distribution you may
like.
fossBytes Newsletter
Get the latest technology news delivered

Dont to your inbox.

forget to
delete Subscribe

12 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals website it sends a

small file to your


computer which
keeps the record of
your browsing
habits and other
data so that the
website can
recognize you on
your next visit, the
file is called a
cookie. Some
website may also
store data locally on
your hard drive.

It is strongly
recommended that
you delete those
cookie files and local fossBytes Newsletter
Get the latest technology news delivered

website data after
to your inbox.
every browsing
session you perform
on TOR as these Subscribe
things may allow the

13 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
DealsTOR for
Google
Search
If you really want to
be anonymous while
using TOR, dont use
Google to search
your queries.
Though it sounds
weird, but this is
because Google
collects information
like your search
requests, stores
cookie files on your
computer and tracks
your browsing
habits to power its fossBytes Newsletter
Get the latest technology news delivered

advertisement
to your inbox.
services. But you
dont want to reveal
that, do you? So, you Subscribe
can use other search

14 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals

HTTP
website on
TOR
You very well know
that TOR can be
exploited using the
vulnerabilities that
exist at its
end-nodes, so if you
access HTTP
websites using it,
there are chances
someone might
access your
information while it
is on the end points.
The data transferred fossBytes Newsletter
Get the latest technology news delivered

to and from an
to your inbox.
HTTP website is
unencrypted and
can be accessed at Subscribe
the end points as

15 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals end-to-end

encryption
protocols like SSL
(Secure Socket
Layer) and TLS
(Transport Layer
Security). So, all your
data remains safe
even if it is outside
the TOR network.

Dont
connect to
the same
server with
and
without fossBytes Newsletter
Get the latest technology news delivered

TOR to your inbox.

simultaneo
usly Subscribe

16 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
dont access the
same server from
outside the TOR
network
(non-anonymously)
as it may lead to a
revelation of your
actual identity. This
is because in case
your internet is
down, both your
connections will
terminate at the
same moment and it
will not be much
difficult for
someone spying on
you to relate the
pieces and complete
the puzzle.
fossBytes Newsletter
Get the latest technology news delivered

to your inbox.
Also, a web server
might try to
correlate the two Subscribe

connections by

17 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
your real IP address.

Final
Words
For the purpose of
being anonymous
on the internet TOR
is a great option, no
matter the federal
agencies criticize it
for acting as a shed
for unlawful
activities. Let me
assure you, it wasnt
created for that
purpose. You only
need to take some
precautions, so you fossBytes Newsletter

dont bust yourself Get the latest technology news delivered
to your inbox.
on the network.
Being anonymous is
the need Subscribe
sometimes, maybe

18 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
internet. TOR is
there for you, you
only have to learn
how to use it
efficiently and youll
start loving the
digital world.

Write your views in


the comments
section below.

Also read:Tor or
VPN? Whats Best
And Which One
Should I Use?

For more
technology updates
and interesting
stories, follow
fossBytes Newsletter
Get the latest technology news delivered

fossBytes. to your inbox.

FROM AROUND THE


WEB Subscribe

19 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
the
Best
Luxury
Mansion
Global by
Dow
Jones

Million Giving How


Dollar Womento
Luxury a Transpose
Homes
Mansion Phone
Turner Cell
Dummies.com
Global by Broadcasting
Dow System
Jones Inc.

Default
Scope
in Java
Dummies.com

Recommended by

Tags: Anonymity Anonymous

Steps to Effective Security Tor

tor browser fossBytes Newsletter


Get the latest technology news delivered

to your inbox.

Aditya
Tiwari
* Subscribe
An engineer
(almost) by

20 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes degree and


Stay up to an
date with fossBytes Open this website in
Tech explorer by
News heart. He
Security writes to
Geek content his
fervour for
Science
technology.
How To
Reviews
Advertise
)
Deals+ YOU MAY ALSO
LIKE...

,0 ,7 ,2

How Arrest Resea


To of the rchers
Stop Oldes Creat
Wi-Fi t e
Steali Torre High
ng nter Speed
And Anyw Netw
Catch here, ork
That 63-ye Faster
Perso ars Than
n Old Intern
Wom et
9 MAR,
2016
an
4 AUG,
Buste 2015
d

16
MAR,
2015
fossBytes Newsletter
Get the latest technology news delivered

to your inbox.

- LATEST DEALS
FROM FOSSBYTES...
Subscribe
ALL DEALS .

21 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals

$87.5 $761 $45


$25 $49 $39

- - -
$50% $92% $83%
OFF OFF OFF
Scrive IT Progr
ner Securi ammi
2 ty ng
CISA, 101
CISSP Bundl
& e
CISM
$45
$22.5
Certifi
cation
$349
Train.. $59
.

$859
$69

fossBytes Newsletter
Get the latest technology news delivered

to your inbox.

Subscribe

22 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


Tech
News
Security
Geek
Science
How To
Reviews
Advertise
)
Deals
we think
Like Reply Jan 27, 2016
3:13pm

Dave Berlinger
Acme Correspondence
University
How do you only log on
to https websites?

ABOUT MORE FROM FOSSBYTES

About Us fossBytes Newsletter


Get the latest technology news delivered

Advertise With Us to your inbox.

Contact Us

Subscribe

23 of 24 4/23/16, 7:42 PM
TOR Anonymity: Things Not To Do While Using TOR http://fossbytes.com/tor-anonymity-things-not-using-tor/

( fossBytes Stay up to date with fossBytes Open this website in


fossBytes Team
Tech
News Privacy Policy
Security
Geek Review Guidelines
Science
How To
Reviews
Advertise
Deals

)

# $ %+ '
Fossbytes

fossBytes Newsletter
Get the latest technology news delivered

to your inbox.

Subscribe

24 of 24 4/23/16, 7:42 PM

You might also like